Back to Developers
RayuduB6 Sirla

RayuduB6 Sirla

SOC Analyst (L1/L2)

Hyderabad
80
Profile Score

About

Accomplished IT Professional as a SOC Analyst (L1/L2) with 5 years of experience in Security Operations, Incident Response, and Threat Hunting across enterprise and global client environments. Hands-on expertise in Splunk ES, Azure Sentinel, Defender XDR, CrowdStrike, and SIEM rule tuning. Proven ability to investigate phishing, malware, brute-force, ransomware, and insider threats, reduce false positives, and enhance detection maturity. CEH & CSA certified, experienced in executive reporting, threat intelligence correlation, and mentoring junior analysts.

Skills & Expertise (42)

Threat Monitoring & Detection Expert
9.1/10
5
Years Exp
Incident Response Advanced
8.9/10
5
Years Exp
Threat Intelligence Advanced
8.7/10
5
Years Exp
Log Analysis Advanced
8.5/10
5
Years Exp
Splunk Enterprise Security Advanced
8.4/10
5
Years Exp
MITRE ATT&CK Technical Support CVEs Windows Event Logs Syslog DNS Proxy Firewall Logs Xsoar Intel 471 Domain Tool’s Open-source Intelligence Jira Confluence Agile/Scrum System Maintenance patch management Performance Optimization Ransomware Azure Sentinel CrowdStrike Falcon Microsoft Defender XDR Mimecast ProofPoint Palo Alto Fortinet Phishing malware TTPs brute force Lateral Movement Triage Containment Eradication Recovery Root Cause Analysis IOCs

Work Experience

SOC Analyst (L1)

Value Cyber Tech Pvt. Ltd.

Nov 2020 - Dec 2023

Monitored and analysed alerts from Splunk Enterprise and Azure Sentinel across multiple customers. Investigated phishing emails and malware campaigns, enhancing detection through mailbox and log analysis. Conducted dark web monitoring and OSINT investigations for fraud, impersonation, and data leakage. Analysed CVEs and emerging threats, producing actionable vulnerability reports. Identified malicious and look‑alike domains and coordinated takedown with hosting providers. Supported end‑to‑end incident management, ensuring SLA adherence and proper escalation. Assisted in new device onboarding and SIEM use‑case creation. Conducted knowledge‑sharing sessions and participated in lessons‑learned reviews.

SOC Analyst (L1/L2)

CMITS

Jan 2024 - Feb 2026

Investigated 20–30 security incidents per day including phishing, malware, brute-force attacks, and unauthorized access attempts. Performed advanced L2 threat analysis using Splunk ES dashboards, notables, and reports. Conducted threat hunting on a daily basis to identify adversary tactics and techniques aligned with MITRE ATT&CK. Reduced false positives by ~30% through SIEM alert tuning and rule optimization. Led root cause analysis (RCA) and coordinated containment and eradication actions with client approvals. Proactively operationalized threat intelligence to create new detection use cases. Delivered monthly threat intelligence and SOC performance reports to executive stakeholders. Performed dark web and OSINT reconnaissance to identify phishing campaigns, look‑alike domains, and exposed assets. Educated users and internal teams on cybersecurity best practices and Microsoft Defender capabilities.

Quality Analyst

TechVOX Pvt. Ltd.

Apr 2018 - Sep 2020

Ensured quality assurance for operational processes and customer interactions. Supported incident escalation processes and compliance with defined SLAs.

Education

B.Tech in Electronics and Communication Engineering - BVC College of Engineering, JNTUK

- 2014 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Skills (42)

Threat Monitoring & Detection Incident Response Threat Intelligence Log Analysis Splunk Enterprise Security MITRE ATT&CK Technical Support CVEs Windows Event Logs Syslog +32 more